Son düzenleyen: Moderatör:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8185e9c2e5e0, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffff8185e9c2e538, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for klmouflt.sys.
*** WARNING: Unable to verify timestamp for win32k.sys.
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 4.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 11.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 84.
Key : Analysis.System.
Value: CreateObject.
BUGCHECK_CODE: 139.
BUGCHECK_P1: 3.
BUGCHECK_P2: ffff8185e9c2e5e0.
BUGCHECK_P3: ffff8185e9c2e538.
BUGCHECK_P4: 0.
TRAP_FRAME: ffff8185e9c2e5e0 -- (.trap 0xffff8185e9c2e5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8185e9c2e7e0 rbx=0000000000000000 rcx=0000000000000003.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff804289244ed rsp=ffff8185e9c2e778 rbp=ffff8185e9c2e7f0.
r8=ffffc90c8c76ae98 r9=ffff8185e9c2e8e4 r10=fffff804106d0290.
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz ac pe cy.
mouclass!MouseClassDequeueRead+0x51:
fffff804`289244ed cd29 int 29h.
Resetting default scope.
EXCEPTION_RECORD: ffff8185e9c2e538 -- (.exr 0xffff8185e9c2e538)
ExceptionAddress: fffff804289244ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: System.
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409.
EXCEPTION_PARAMETER1: 0000000000000003.
EXCEPTION_STR: 0xc0000409.
STACK_TEXT:
ffff8185`e9c2e2b8 fffff804`107ef929 : 00000000`00000139 00000000`00000003 ffff8185`e9c2e5e0 ffff8185`e9c2e538 : nt!KeBugCheckEx.
ffff8185`e9c2e2c0 fffff804`107efd50 : 00000000`00000040 00000000`00000b24 00000000`00000002 ffffc90c`960c3140 : nt!KiBugCheckDispatch+0x69.
ffff8185`e9c2e400 fffff804`107ee0e3 : 00000000`00000246 00000000`000005ce 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0.
ffff8185`e9c2e5e0 fffff804`289244ed : fffff804`28924c7a ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323.
ffff8185`e9c2e778 fffff804`28924c7a : ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 ffff8185`e9c2e8f0 : mouclass!MouseClassDequeueRead+0x51.
ffff8185`e9c2e780 fffff804`28911403 : ffffc90c`8c73fde0 ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 : mouclass!MouseClassServiceCallback+0x9a.
ffff8185`e9c2e820 ffffc90c`8c73fde0 : ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 : klmouflt+0x1403.
ffff8185`e9c2e828 ffffc90c`8c73fc90 : ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 : 0xffffc90c`8c73fde0.
ffff8185`e9c2e830 ffffc90c`8d299a10 : ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 : 0xffffc90c`8c73fc90.
ffff8185`e9c2e838 ffff8185`e9c2e8e4 : 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 00000000`00000008 : 0xffffc90c`8d299a10.
ffff8185`e9c2e840 00000000`000001a0 : fffff804`287c23c4 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 : 0xffff8185`e9c2e8e4.
ffff8185`e9c2e848 fffff804`287c23c4 : 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 00000000`00000000 : 0x1a0.
ffff8185`e9c2e850 fffff804`288f3aa8 : 00000000`00000000 00000000`00000002 ffff8185`e9c2e8f8 ffffc90c`8d2998b0 : HIDPARSE!HidP_GetScaledUsageValue+0x174.
ffff8185`e9c2e8a0 fffff804`1063c7ce : 00000000`00000000 ffff8185`e9c2ea00 00000000`00000001 ffff8185`00000000 : mouhid!MouHid_ReadComplete+0x758.
ffff8185`e9c2e940 fffff804`1063c697 : 00000000`00000000 ffffc90c`8808f006 ffffc90c`8d2b4970 00000000`00000000 : nt!IopfCompleteRequest+0x11e.
ffff8185`e9c2ea30 fffff804`2878aef5 : ffffc90c`8ce4d5d8 ffffc90c`8c76c102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17.
ffff8185`e9c2ea60 fffff804`2878a7ed : ffffc90c`8c76c1d0 ffffc90c`8c76c102 ffffc90c`8c76c1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5.
ffff8185`e9c2eb60 fffff804`1063c7ce : ffffc90c`8c77f010 ffffc90c`8c77f010 ffff8185`e9c2ec01 ffffc90c`8c77f75b : HIDCLASS!HidpInterruptReadComplete+0x37d.
ffff8185`e9c2ec00 fffff804`1063c697 : 00000000`00000001 00000000`00000000 ffffc90c`8c685020 00000000`00000002 : nt!IopfCompleteRequest+0x11e.
ffff8185`e9c2ecf0 fffff804`125a811a : 00000000`00000000 ffffc90c`86475dd0 ffffc90c`8c77f010 ffff8185`e9c2edd0 : nt!IofCompleteRequest+0x17.
ffff8185`e9c2ed20 fffff804`125a5bbf : ffffc90c`8dcdbb02 ffffc90c`8c6b87a0 ffffc90c`8c77f010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffff8185`e9c2edb0 fffff804`27af0eed : 00000000`ffffff02 ffffc90c`8dcdba30 ffffc90c`8c685400 ffffc90c`8c685400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffff8185`e9c2ee10 fffff804`27af0db1 : ffffc90c`8dcdbbd0 00000000`00000009 ffffc90c`8dcdbc60 ffff8185`e9c2f028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9.
ffff8185`e9c2ee70 fffff804`27af0ba0 : 00000000`00000004 ffff8185`e9c2efe0 00000000`00000000 ffffc90c`8c71f050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd.
ffff8185`e9c2ef20 fffff804`27ae88c1 : 00000000`00000004 ffff8185`e9c2eff8 00000000`00000008 ffff8185`e9c2f000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10.
ffff8185`e9c2ef50 fffff804`27ae83f5 : 00000000`00000780 000036f3`799a1700 ffffc90c`868d4330 ffffc90c`8c545cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb1.
ffff8185`e9c2efb0 fffff804`27ae80cc : 00000000`00000002 00000000`00000000 000036f3`81809328 00000000`00000001 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315.
ffff8185`e9c2f0b0 fffff804`125a38f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc.
ffff8185`e9c2f0e0 fffff804`1063a69e : ffffa001`5d9e3240 00000000`00000000 ffff8185`e9c2f3e0 fffff804`27a8870b : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
ffff8185`e9c2f120 fffff804`10639984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e.
ffff8185`e9c2f290 fffff804`107e158e : ffffffff`00000000 ffffa001`5d9e0180 ffffa001`5d9eb640 ffffc90c`944c0080 : nt!KiRetireDpcList+0x1f4.
ffff8185`e9c2f520 00000000`00000000 : ffff8185`e9c30000 ffff8185`e9c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.
SYMBOL_NAME: mouclass!MouseClassDequeueRead+51.
MODULE_NAME: mouclass.
IMAGE_NAME: mouclass.sys.
IMAGE_VERSION: 10.0.19041.1030.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 51.
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32}
Followup: MachineOwner.
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8185e9c2e5e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8185e9c2e538, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for klmouflt.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0802
BIOS_DATE: 09/06/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X299-DELUXE
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffff8185e9c2e5e0
BUGCHECK_P3: ffff8185e9c2e538
BUGCHECK_P4: 0
TRAP_FRAME: ffff8185e9c2e5e0 -- (.trap 0xffff8185e9c2e5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8185e9c2e7e0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804289244ed rsp=ffff8185e9c2e778 rbp=ffff8185e9c2e7f0
r8=ffffc90c8c76ae98 r9=ffff8185e9c2e8e4 r10=fffff804106d0290
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
mouclass!MouseClassDequeueRead+0x51:
fffff804`289244ed cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8185e9c2e538 -- (.exr 0xffff8185e9c2e538)
ExceptionAddress: fffff804289244ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 18
CPU_MHZ: b58
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200005E'00000000 (cache) 200005E'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-14-2020 16:58:50.0002
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff804107ef929 to fffff804107dda20
STACK_TEXT:
ffff8185`e9c2e2b8 fffff804`107ef929 : 00000000`00000139 00000000`00000003 ffff8185`e9c2e5e0 ffff8185`e9c2e538 : nt!KeBugCheckEx
ffff8185`e9c2e2c0 fffff804`107efd50 : 00000000`00000040 00000000`00000b24 00000000`00000002 ffffc90c`960c3140 : nt!KiBugCheckDispatch+0x69
ffff8185`e9c2e400 fffff804`107ee0e3 : 00000000`00000246 00000000`000005ce 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8185`e9c2e5e0 fffff804`289244ed : fffff804`28924c7a ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8185`e9c2e778 fffff804`28924c7a : ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 ffff8185`e9c2e8f0 : mouclass!MouseClassDequeueRead+0x51
ffff8185`e9c2e780 fffff804`28911403 : ffffc90c`8c73fde0 ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 : mouclass!MouseClassServiceCallback+0x9a
ffff8185`e9c2e820 ffffc90c`8c73fde0 : ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 : klmouflt+0x1403
ffff8185`e9c2e828 ffffc90c`8c73fc90 : ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 : 0xffffc90c`8c73fde0
ffff8185`e9c2e830 ffffc90c`8d299a10 : ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 : 0xffffc90c`8c73fc90
ffff8185`e9c2e838 ffff8185`e9c2e8e4 : 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 00000000`00000008 : 0xffffc90c`8d299a10
ffff8185`e9c2e840 00000000`000001a0 : fffff804`287c23c4 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 : 0xffff8185`e9c2e8e4
ffff8185`e9c2e848 fffff804`287c23c4 : 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 00000000`00000000 : 0x1a0
ffff8185`e9c2e850 fffff804`288f3aa8 : 00000000`00000000 00000000`00000002 ffff8185`e9c2e8f8 ffffc90c`8d2998b0 : HIDPARSE!HidP_GetScaledUsageValue+0x174
ffff8185`e9c2e8a0 fffff804`1063c7ce : 00000000`00000000 ffff8185`e9c2ea00 00000000`00000001 ffff8185`00000000 : mouhid!MouHid_ReadComplete+0x758
ffff8185`e9c2e940 fffff804`1063c697 : 00000000`00000000 ffffc90c`8808f006 ffffc90c`8d2b4970 00000000`00000000 : nt!IopfCompleteRequest+0x11e
ffff8185`e9c2ea30 fffff804`2878aef5 : ffffc90c`8ce4d5d8 ffffc90c`8c76c102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
ffff8185`e9c2ea60 fffff804`2878a7ed : ffffc90c`8c76c1d0 ffffc90c`8c76c102 ffffc90c`8c76c1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
ffff8185`e9c2eb60 fffff804`1063c7ce : ffffc90c`8c77f010 ffffc90c`8c77f010 ffff8185`e9c2ec01 ffffc90c`8c77f75b : HIDCLASS!HidpInterruptReadComplete+0x37d
ffff8185`e9c2ec00 fffff804`1063c697 : 00000000`00000001 00000000`00000000 ffffc90c`8c685020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffff8185`e9c2ecf0 fffff804`125a811a : 00000000`00000000 ffffc90c`86475dd0 ffffc90c`8c77f010 ffff8185`e9c2edd0 : nt!IofCompleteRequest+0x17
ffff8185`e9c2ed20 fffff804`125a5bbf : ffffc90c`8dcdbb02 ffffc90c`8c6b87a0 ffffc90c`8c77f010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffff8185`e9c2edb0 fffff804`27af0eed : 00000000`ffffff02 ffffc90c`8dcdba30 ffffc90c`8c685400 ffffc90c`8c685400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffff8185`e9c2ee10 fffff804`27af0db1 : ffffc90c`8dcdbbd0 00000000`00000009 ffffc90c`8dcdbc60 ffff8185`e9c2f028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9
ffff8185`e9c2ee70 fffff804`27af0ba0 : 00000000`00000004 ffff8185`e9c2efe0 00000000`00000000 ffffc90c`8c71f050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
ffff8185`e9c2ef20 fffff804`27ae88c1 : 00000000`00000004 ffff8185`e9c2eff8 00000000`00000008 ffff8185`e9c2f000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
ffff8185`e9c2ef50 fffff804`27ae83f5 : 00000000`00000780 000036f3`799a1700 ffffc90c`868d4330 ffffc90c`8c545cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb1
ffff8185`e9c2efb0 fffff804`27ae80cc : 00000000`00000002 00000000`00000000 000036f3`81809328 00000000`00000001 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffff8185`e9c2f0b0 fffff804`125a38f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffff8185`e9c2f0e0 fffff804`1063a69e : ffffa001`5d9e3240 00000000`00000000 ffff8185`e9c2f3e0 fffff804`27a8870b : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
ffff8185`e9c2f120 fffff804`10639984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffff8185`e9c2f290 fffff804`107e158e : ffffffff`00000000 ffffa001`5d9e0180 ffffa001`5d9eb640 ffffc90c`944c0080 : nt!KiRetireDpcList+0x1f4
ffff8185`e9c2f520 00000000`00000000 : ffff8185`e9c30000 ffff8185`e9c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
THREAD_SHA1_HASH_MOD_FUNC: 931af43e969acb28bfcd3c2b381f80f78cc4f846
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e2d89e4c50aad9703c19b45d03b5c6c0c8c6111b
THREAD_SHA1_HASH_MOD: d578d3c817ef1357b91cc3984614fa81edbcc04f
FOLLOWUP_IP:
mouclass!MouseClassDequeueRead+51
fffff804`289244ed cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: mouclass!MouseClassDequeueRead+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3e1aa9cc
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead
TARGET_TIME: 2020-06-12T21:59:14.000Z
OSBUILD: 19041
OSSERVICEPACK: 329
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 7275
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_mouclass!mouseclassdequeueread
FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32}
Followup: MachineOwner
---------
Evet SSD ve HDD kullanıyorum.
HD Tune testi yapma şansınız var mı? Ben de yazılımlardan şikayetçiydim bu hatayı aldığımdan. Sonra test yapınca HDD diskinde oluşan bad sectorden ötürü olduğunu anladım. Belki bu neden oluyordur sizde de.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.